Security Target, Version 3.9

March 18, 2008

 

 

Configuration of the TOE is performed via a Command Line Interface (CLI) by physically connecting a device (such as a laptop) to the serial interface of the TOE and utilizing dumb-terminal software. After the TOE is configured, it can be managed remotely via a Graphical User Interface (GUI) which is accessed by a management workstation connected to the protected and trusted internal network.

2.3 TOE Boundaries and Scope

This section identifies the physical and logical components of the TOE that are included in this evaluation.

2.3.1 Physical Boundary

Figure 3 and Figure 4 below illustrates the physical boundary of this CC evaluation:

Legend:

TOE Boundary

The World

 

Enterprise

 

VPN Tunnel

Corporate

 

 

 

Internet

Network

 

 

Nortel

Nortel VPN Router

 

VPN Client

 

 

 

Workstation

 

 

 

 

Corporate

 

 

Servers

 

CLI Workstation

Management

 

 

Workstation

Figure 3 - Physical TOE Boundary

Figure 4 - Physical TOE Boundary in Branch Office Tunnel Mode

Nortel VPN Router v7.05 and Client Workstation v7.11

Page 10 of 67

© 2008 Nortel Networks

Page 10
Image 10
Nortel Networks 7.05, 7.11 manual TOE Boundaries and Scope, Physical Boundary